Skip to main content

Defining a Trust Framework Design Process

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8058))

Abstract

Trust Management researchers have created several sound frameworks for well-defined problems based on their deep understanding of the field and the current state of the art. However, Trust Management experts are rarely contacted for the design of distributed business applications. Developers of these kinds of business applications are not familiar with latest results and are only aware of a very limited set of applicable solutions. This hinders the adaption of these novel security solutions into provided future services. To support the integration of Trust Management into these areas we defined a design process, which can be applied systematically by developers. Based on the design process they can use their scenario knowledge to narrow down their design space and finally select from a limited set of applicable implementations the best fit. We extended the static TrustFraMM meta-description of Trust Management in a way to enable it to support the exploration and exclusion of existing trust functionality implementations. We built our process on a number of requirements collected through our user-centered design approach. We also provide a possible visualization of the process which we evaluated using a paper prototype. Our process had a positive user acceptance among the questioned users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 93–107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Marti, S., Garcia-Molina, H.: Limited reputation sharing in P2P systems. In: Proceedings of the 5th ACM Conference on Electronic Commerce, EC 2004, pp. 91–101. ACM Press, New York (2004)

    Google Scholar 

  3. Zouridaki, C., Mark, B.L., Hejmo, M.: Byzantine robust trust establishment for mobile ad hoc networks. Telecommunication Systems 35, 189–206 (2007)

    Article  Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Comput. Soc. Press (1996)

    Google Scholar 

  5. Vinkovits, M., Zimmermann, A.: TrustFraMM: Meta Description for Trust Frameworks. In: ASE/IEEE International Conference on Privacy, Security, Risk and Trust, Amsterdam, Netherlands, pp. 772–778 (2012)

    Google Scholar 

  6. Gould, J., Lewis, C.: Designing for usability: key principles and what designers think. Communications of the ACM 28, 300–311 (1985)

    Article  Google Scholar 

  7. Zurko, M.E., Simon, R.T.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms, NSPW 1996, pp. 27–33. ACM Press, New York (1996)

    Chapter  Google Scholar 

  8. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 618–644 (2007)

    Article  Google Scholar 

  9. Artz, D., Gil, Y.: A survey of trust in computer science and the Semantic Web. Web Semantics: Science, Services and Agents on the World Wide Web 5, 58–71 (2007)

    Article  Google Scholar 

  10. Refsdal, A., Solhaug, B., Stølen, K.: A UML-based Method for the Development of Policies to Support Trust Management. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C.D. (eds.) Trust Management II. IFIP, vol. 263, pp. 33–49. Springer, Boston (2008)

    Chapter  Google Scholar 

  11. Povey, D.: Developing electronic trust policies using a risk management model. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 1–16. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  12. Vinkovits, M.: Towards requirements for trust management. In: Privacy, Security and Trust (PST) 2012, pp. 159–160. IEEE Comput. Soc., Paris (2012)

    Chapter  Google Scholar 

  13. eBay - The World’s Online Marketplace (2012), http://www.ebay.com

  14. Greenberg, S., Carpendale, S., Marquardt, N., Buxton, B.: Sketching User Experiences: The Workbook. Morgan Kaufmann Publishers Inc., San Francisco (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vinkovits, M., Zimmermann, A. (2013). Defining a Trust Framework Design Process. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2013. Lecture Notes in Computer Science, vol 8058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40343-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40343-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40342-2

  • Online ISBN: 978-3-642-40343-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics